Thursday , May 16 2024

International

Google Patches 46 Android Vulnerabilities, Including 3 Actively Exploited

Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Three of these vulnerabilities have been identified as actively exploited in targeted attacks. One vulnerability, tracked as CVE-2023-26083, is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and …

Read More »

Microsoft Teams exploiting tool on GitHub, What Microsoft say?

A new tool is available on GitHub that gives attackers a way to leverage a recently disclosed vulnerability in Microsoft Teams and automatically deliver malicious files to targeted Teams users in an organization. The tool, dubbed “TeamsPhisher,” works in environments where an organization allows communications between its internal Teams users …

Read More »

Decrypter released for Akira ransomware

Akira ransomware first appeared in 2017. It targeted video folders and encrypted the files without leaving any ransom notes. The encrypted files had the extension “.akira”. Researchers have been working on decrypting the files affected by Akira ransomware, and they have finally made a breakthrough. Researchers at Avast have found …

Read More »

Hackers disrupt Russian satellite communications provider

A group of hackers claiming affiliation with the Wagner Group has taken down Dozor-Teleport, a Russian satellite communications provider used by energy companies and the country’s defense and security services. The attack, which began on Wednesday at 10 p.m. EST, has resulted in the disconnection of Dozor-Teleport from the internet …

Read More »

Akira ransomware targets VMware ESXi servers

The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. Akira first emerged in March 2023, targeting Windows systems in various industries, including education, finance, real estate, manufacturing, and consulting. Like other enterprise-targeting ransomware gangs, the threat actors steal data from …

Read More »

MITRE releases new list of top 25 most dangerous software bugs

MITRE, a non-profit organization that provides research and development in the areas of cybersecurity and information assurance, has released its list of the top 25 most dangerous software weaknesses. The list is based on data from the Common Vulnerabilities and Exposures (CVE) database, which is a repository of known security …

Read More »